First published: Wed Feb 05 2014(Updated: )
Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation RSLogix 5000 Design and Configuration Software | =7.0 | |
Rockwell Automation RSLogix 5000 Design and Configuration Software | =18.0 | |
Rockwell Automation RSLogix 5000 Design and Configuration Software | =20.01 | |
Rockwell Automation RSLogix 5000 Design and Configuration Software | =21.0 | |
Rockwell Automation Logix 5000 Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0755 is classified as a medium severity vulnerability due to improper password protection that could lead to unauthorized access to sensitive information.
To fix CVE-2014-0755, update RSLogix 5000 to the latest version that includes proper password protection for .ACD files.
CVE-2014-0755 affects Rockwell Automation's RSLogix 5000 versions 7 through 21.0.
Yes, local users can exploit CVE-2014-0755 to obtain sensitive information or modify data due to the lack of proper password protection.
Currently, there are no known workarounds for CVE-2014-0755; the recommended action is to update the software.